Deployment Options
RAD Security supports three deployment models designed to meet different security, compliance, and operational requirements. All models feature isolated agent runtimes and encrypted telemetry for maximum security.Deployment Models
| Model | Description | Use Case |
|---|---|---|
| Cloud-hosted | Fully managed by RAD | Quick setup, minimal infrastructure |
| Hybrid | Control plane in RAD cloud, agents in your VPC | Balance of control and management |
| Self-managed | Host everything on-prem/air-gapped | Maximum control, compliance requirements |
Technical Requirements
- Isolated Agent Runtimes - Secure execution environments
- Encrypted Telemetry - End-to-end data protection
- Network Connectivity - HTTPS outbound to RAD Security APIs
- Resource Allocation - CPU/memory based on deployment model